Data breaches Data breaches

Technology is getting smarter, but hackers are still stealing data through basic web application flaws. Even sophisticated attacks exploit a series of basic security oversights. In this topic page, we keep tabs on some of the most prominent breaches and discuss how you can avoid being a statistic.

Review: Hacking: The Art of Exploitation

Review: Hacking: The Art of Exploitation

This book is truly meaty stuff. It explains in detail what every hacker should know, but more importantly, what every security expert should be aware of so they can take action to avoid being hacked.  

Dan Ilett Jan 22 2004 12:00AM Security
Hacking: The Cyberworld's Oldest Profession is Indispensable R&D

Hacking: The Cyberworld's Oldest Profession is Indispensable R&D

To label the genre that is a combination of pure digital finesse and old fashioned guile as something so artless and blunt as 'hacking' seems unfortunate.
Bryan Davies Jan 19 2004 11:05AM Security
Hackers Get Green Light

Hackers Get Green Light

There have been endless debates over whether or not to hire hackers.
Peter Stephenson Jan 19 2004 10:45AM Security
SECURITY LIBRARY: Hacker's Challenge

SECURITY LIBRARY: Hacker's Challenge

Technical books of more than 350 pages are not meant to be read in one helping, like mystery novels.
Anton Chuvakin Jan 19 2004 9:58AM Security
Are Corporations Making the Internet Safe for Hackers?

Are Corporations Making the Internet Safe for Hackers?

In 1984, the London Metropolitan Police Service, under the efforts of John Austen, had the pioneering vision to start one of the first computer crime units in the world.
Richard R. Jan 16 2004 2:00PM Security
When the Hackers Come Knocking

When the Hackers Come Knocking

When a computer has been hacked, the first reaction of the system administrator is usually to restore the system and bring it back online as soon as possible.
the Interpol Jan 16 2004 10:42AM Security
Hacker Repellent: Deterring Hackers on a Shoestring Budget

Hacker Repellent: Deterring Hackers on a Shoestring Budget

Today, hackers scan and probe sites of all sizes to find those most vulnerable to e-shoplifting, data theft or portals to access broader attacks.
Amit Klein Jan 14 2004 1:21PM Security
Hackers: Are you inviting them in?

Hackers: Are you inviting them in?

Surely by now, organizations should have erected the strongest barriers to hackers. But, as Illena Armstrong and others point out, many holes remain
Illena Armstrong Jan 13 2004 11:55AM Security
White-hat Hacking 101

White-hat Hacking 101

These days I spend my time breaking into networks and web servers for a living.
Peter Wood Jan 12 2004 1:04PM Security
Wardialing - The Forgotten Front in the War against Hackers

Wardialing - The Forgotten Front in the War against Hackers

Hackers have thousands of different ways to access or exploit computing environments.
Jonathan Gossels, Jan 9 2004 4:21PM Security
Security Devices Don’t Always Save Companies from Hackers

Security Devices Don’t Always Save Companies from Hackers

On May 29, 2003, the Computer Security Institute (CSI) and the FBI published the results of their most recent Computer Crime and Security Survey, now in its eighth year.
Staff Writers Jan 9 2004 4:16PM Security
Crackers, Hackers and Thieves - don’t make their Christmas - leave your Handhelds at home!

Crackers, Hackers and Thieves - don’t make their Christmas - leave your Handhelds at home!

Leave your laptop or personal handheld at home when you join the Christmas rush and revelry, or risk losing your mobile device and all the information which resides on it.
Magnus Ahlberg Jan 9 2004 12:39PM Security
Spammers or hackers?

Spammers or hackers?

Byron Connolly Jan 1 2000 12:00AM Telco/ISP
Web site defacement risk debated

Web site defacement risk debated

Staff Writers Jan 1 2000 12:00AM Security

Log In

  |  Forgot your password?